|
|
Books > Computing & IT
Virtual Reality (VR) is the use of computer technology to construct
an environment that is simulated. VR places the user inside and in
the center of the experience, unlike conventional user interfaces.
Users are immersed and able to connect with 3D environments instead
of seeing a screen in front of them. The computer has to role to
provide the experiences of the user in this artificial environment
by simulating as many senses as possible, such as sight, hearing,
touch and smell. In Augmented Reality (AR) we have an enhanced
version of the real physical world that is achieved through the use
of digital visual elements, sound, or other sensory stimuli
delivered via technology. It can be seen as VR imposed into real
life. In both VR and AR the experience is composed of a virtual or
extended world, an immersion technology, sensory feedback and
interactivity. These elements use a multitude of technologies that
must work together and presented to the user seamlessly integrated
and synchronized. This book is dedicated to applications, new
technologies and emerging trends in the fields of virtual reality
and augmented reality in healthcare. It is intended to cover
technical areas as well as areas of applied intervention. It is
expected to cover hardware and software technologies while
encompassing all components of the virtual experience. The main
goal of this book is to show how to put Virtual Reality in action
by linking academic and informatics researchers with professionals
who use and need VR in their day-a-day work, with a special focus
on healthcare professionals and related areas. The idea is to
disseminate and exchange the knowledge, information and technology
provided by the international communities in the area of VR, AR and
XR throughout the 21st century. Another important goal is to
synthesize all the trends, best practices, methodologies, languages
and tools which are used to implement VR. In order to shape the
future of VR, new paradigms and technologies should be discussed,
not forgetting aspects related to regulation and certification of
VR technologies, especially in the healthcare area. These last
topics are crucial for the standardization of VR. This book will
present important achievements and will show how to use VR
technologies in a full range of settings able to provide decision
support anywhere and anytime using this new approach.
College Technology Survival Kit provides students with the
necessary tools and knowledge to succeed in their academic careers
through the use of basic computer skills and other technology. The
book helps to prevent the technology-related frustrations students
can encounter when asked to write papers, create presentations, and
navigate a school's learning management system. The book features
information on computer programs like Microsoft Word, Excel, and
PowerPoint, as well as commonly used learning management systems
Blackboard and Canvas. It offers students lessons in file
management, Google web applications, email programs, and developing
presentations in Prezi. The text provides complete, step-by-step
instructions to help students navigate common computer-based
programs and systems and develop technological competency. The
revised second edition features updates to student project and
student check features within each chapter. It also includes
updated instructions for navigating Microsoft Work, with material
that covers the use of document themes, theme fonts, and more.
College Technology Survival Kit is a cross-disciplinary,
supplementary text designed to support all higher education
students, regardless of their field of study. It is ideal for
foundational courses in computer sciences or other classes where
basic computer skills are needed.
This book serves as a guide to help the reader develop an awareness
of security vulnerabilities and attacks, and encourages them to be
circumspect when using the various computer resources and tools
available today. For experienced users, Computer Science Security
presents a wide range of tools to secure legacy software and
hardware. Computing has infiltrated all fields nowadays. No one can
escape this wave and be immune to security attacks, which continue
to evolve, gradually reducing the level of expertise needed by
hackers. It is high time for each and every user to acquire basic
knowledge of computer security, which would enable them to mitigate
the threats they may face both personally and professionally. It is
this combined expertise of individuals and organizations that will
guarantee a minimum level of security for families, schools, the
workplace and society in general.
The Feature-Driven Method for Structural Optimization details a
novel structural optimization method within a CAD framework,
integrating structural optimization and feature-based design. The
book presents cutting-edge research on advanced structures and
introduces the feature-driven structural optimization method by
regarding engineering features as basic design primitives.
Consequently, it presents a method that allows structural
optimization and feature design to be done simultaneously so that
feature attributes are preserved throughout the design process. The
book illustrates and supports the effectiveness of the method
described, showing potential applications through numerical
modeling techniques and programming. This volume presents a
high-performance optimization method adapted to engineering
structures-a novel perspective that will help engineers in the
computation, modeling and design of advanced structures.
The advent of connected, smart technologies for the built
environment may promise a significant value that has to be reached
to develop digital city models. At the international level, the
role of digital twin is strictly related to massive amounts of data
that need to be processed, which proposes several challenges in
terms of digital technologies capability, computing,
interoperability, simulation, calibration, and representation. In
these terms, the development of 3D parametric models as digital
twins to evaluate energy assessment of private and public buildings
is considered one of the main challenges of the last years. The
ability to gather, manage, and communicate contents related to
energy saving in buildings for the development of smart cities must
be considered a specificity in the age of connection to increase
citizen awareness of these fields. The Handbook of Research on
Developing Smart Cities Based on Digital Twins contains in-depth
research focused on the description of methods, processes, and
tools that can be adopted to achieve smart city goals. The book
presents a valid medium for disseminating innovative data
management methods related to smart city topics. While highlighting
topics such as data visualization, a web-based ICT platform, and
data-sharing methods, this book is ideally intended for researchers
in the building industry, energy, and computer science fields;
public administrators; building managers; and energy professionals
along with practitioners, stakeholders, researchers, academicians,
and students interested in the implementation of smart technologies
for the built environment.
FINANCIAL FREEDOM IS JUST A DISTANT DREAM FOR MANY OF US. BUT WHAT
IF I TELL YOU THAT THERE IS AN EASY WAY FOR YOU TO EARN A PASSIVE
INCOME WITH LITTLE TO NO INVESTMENT? Yes, you read that right! Many
people think that the only way to earn more and to save more is to
stick it out with the 9-to-5 grind. However, they could not be more
mistaken. This book will give you important information on how to
earn PASSIVE income, and not just that! This supplemental income
can eventually become your key to financial freedom if you do
things right, and this book will tell you how! In this book, you
will find all the critical information you need to get started with
affiliate marketing. PLUS included is a BONUS training course -
FREE 4 Day blueprint on how to build a profitable online business
with affiliate marketing The key to your financial freedom is
between the pages of this book, and the time to get started is NOW!
Coherent Electron Microscopy: Designing Faster and Brighter
Electron Sources, Volume 227 in the Advances in Imaging and
Electron Physics series, merges two long-running serials, Advances
in Electronics and Electron Physics and Advances in Optical and
Electron Microscopy. Chapters in this new release cover
Characterization of nanomaterials properties using FE-TEM, Cold
field-emission electron sources: From higher brightness to
ultrafast beams, Every electron counts: Towards the development of
aberration optimized and aberration corrected electron sources, and
more. The series features articles on the physics of electron
devices (especially semiconductor devices), particle optics at high
and low energies, microlithography, image science, digital image
processing, electromagnetic wave propagation, electron microscopy
and the computing methods used in all these domains.
Trusted Platform Modules (TPMs) are small, inexpensive chips which
provide a limited set of security functions. They are most commonly
found as a motherboard component on laptops and desktops aimed at
the corporate or government markets, but can also be found on many
consumer-grade machines and servers, or purchased as independent
components. Their role is to serve as a Root of Trust - a highly
trusted component from which we can bootstrap trust in other parts
of a system. TPMs are most useful for three kinds of tasks:
remotely identifying a machine, or machine authentication;
providing hardware protection of secrets, or data protection; and
providing verifiable evidence about a machine's state, or
attestation. This book describes the primary uses for TPMs, and
practical considerations such as when TPMs can and should be used,
when they shouldn't be, what advantages they provide, and how to
actually make use of them, with use cases and worked examples of
how to implement these use cases on a real system. Topics covered
include when to use a TPM; TPM concepts and functionality;
programming introduction; provisioning: getting the TPM ready to
use; first steps: TPM keys; machine authentication; data
protection; attestation; other TPM features; software and
specifications; and troubleshooting. Appendices contain basic
cryptographic concepts; command equivalence and requirements
charts; and complete code samples.
Advances in Imaging and Electron Physics, Volume 215, merges two
long-running serials, Advances in Electronics and Electron Physics
and Advances in Optical and Electron Microscopy. The series
features extended articles on the physics of electron devices
(especially semiconductor devices), particle optics at high and low
energies, microlithography, image science, digital image
processing, electromagnetic wave propagation, electron microscopy
and the computing methods used in all these domains.
The book aims to integrate the aspects of IoT, Cloud computing and
data analytics from diversified perspectives. The book also plans
to discuss the recent research trends and advanced topics in the
field which will be of interest to academicians and researchers
working in this area. Thus, the book intends to help its readers to
understand and explore the spectrum of applications of IoT, cloud
computing and data analytics. Here, it is also worth mentioning
that the book is believed to draw attention on the applications of
said technology in various disciplines in order to obtain enhanced
understanding of the readers. Also, this book focuses on the
researches and challenges in the domain of IoT, Cloud computing and
Data analytics from perspectives of various stakeholders.
The Internet of Edges is a new paradigm whose objective is to keep
data and processing close to the user. This book presents three
different levels of Edge networking: MEC (Multi-access Edge
Computing), Fog and Far Edge (sometimes called Mist or Skin). It
also reviews participatory networks, in which user equipment
provides the resources for the Edge network. Edge networks can be
disconnected from the core Internet, and the interconnection of
autonomous edge networks can then form the Internet of Edges. This
book analyzes the characteristics of Edge networks in detail,
showing their capacity to replace the imposing Clouds of core
networks due to their superior server response time, data security
and energy saving.
Edsger Wybe Dijkstra (1930-2002) was one of the most influential
researchers in the history of computer science, making fundamental
contributions to both the theory and practice of computing. Early
in his career, he proposed the single-source shortest path
algorithm, now commonly referred to as Dijkstra's algorithm. He
wrote (with Jaap Zonneveld) the first ALGOL 60 compiler, and
designed and implemented with his colleagues the influential THE
operating system. Dijkstra invented the field of concurrent
algorithms, with concepts such as mutual exclusion, deadlock
detection, and synchronization. A prolific writer and forceful
proponent of the concept of structured programming, he convincingly
argued against the use of the Go To statement. In 1972 he was
awarded the ACM Turing Award for "fundamental contributions to
programming as a high, intellectual challenge; for eloquent
insistence and practical demonstration that programs should be
composed correctly, not just debugged into correctness; for
illuminating perception of problems at the foundations of program
design." Subsequently he invented the concept of self-stabilization
relevant to fault-tolerant computing. He also devised an elegant
language for nondeterministic programming and its weakest
precondition semantics, featured in his influential 1976 book A
Discipline of Programming in which he advocated the development of
programs in concert with their correctness proofs. In the later
stages of his life, he devoted much attention to the development
and presentation of mathematical proofs, providing further support
to his long-held view that the programming process should be viewed
as a mathematical activity. In this unique new book, 31 computer
scientists, including five recipients of the Turing Award, present
and discuss Dijkstra's numerous contributions to computing science
and assess their impact. Several authors knew Dijkstra as a friend,
teacher, lecturer, or colleague. Their biographical essays and
tributes provide a fascinating multi-author picture of Dijkstra,
from the early days of his career up to the end of his life.
AI-ENABLED 6G NETWORKS AND APPLICATIONS Provides authoritative
guidance on utilizing AI techniques in 6G network design and
optimization Written and edited by active researchers, this book
covers hypotheses and practical considerations and provides
insights into the design of evolutionary AI algorithms for 6G
networks, with focus on network transparency, interpretability and
simulatability for vehicular networks, space systems, surveillance
systems and their usages in different emerging engineering fields.
AI-Enabled 6G Networks and Applications includes a review of AI
techniques for 6G Networks and will focus on deployment of AI
techniques to efficiently and effectively optimize the network
performance, including AI-empowered mobile edge computing,
intelligent mobility and handover management, and smart spectrum
management. This book includes the design of a set of evolutionary
AI hybrid algorithms with communication protocols, showing how to
use them in practice to solve problems relating to vehicular
networks, aerial networks, and communication networks. Reviews
various types of AI techniques such as AI-empowered mobile edge
computing, intelligent handover management, and smart spectrum
management Describes how AI techniques manage computation
efficiency, algorithm robustness, hardware development, and energy
management Identifies and provides solutions to problems in current
4G/5G networks and emergent 6G architectures Discusses privacy and
security issues in IoT-enabled 6G Networks Examines the use of
machine learning to achieve closed-loop optimization and
intelligent wireless communication AI-Enabled 6G Networks and
Applications is an essential reference guide to advanced hybrid
computational intelligence methods for 6G supportive networks and
protocols, suitable for graduate students and researchers in
network forensics and optimization, computer science, and
engineering.
|
|